39 Followers
130 Following
400 Posts

- LAN on eth0: #Kea #DHCP serving internal hosts
- WAN on eth0.3: DHCP client talking to ISP

Kea: „I don't care about VLAN tagging, give me all your packets for my raw socket. By the way, how about using this nice internal LAN address for my hosts WAN interface?“

https://gitlab.isc.org/isc-projects/kea/-/issues/1117

At least the issue has recently been closed (after six years). Now waiting for an updated package to arrive. Or an alternative - whatever comes first. Any recommendations apart from dnsmasq?

Mix of physical and virtual interfaces (VLAN) does not work (#1117) · Issues · ISC Open Source Projects / Kea · GitLab

Describe the bug Setting up KEA DHCP server on a system to listen to a physical interface and one or multiple virtual interfaces causes wrong IP pools to...

GitLab

Searching the internet for #CARP, many sites recommend using a password length of 30 characters. #FreeBSD silently truncates it to 19. The Debian manpage of #ucarp claims to support 20 characters, but refuses to run given more than 19.

So why exactly 19 characters? 20 is the size of SHA-1 hashes and a comment in ip_carp.h suggests that CARP is supposed to use such a hash derived from a password. However, actual implementations treat it as a null-terminated string.

@heisec

Weil es im Artikel fehlt:

"This issue occurs specifically during installation, when the user launches the DDPM Application UI via the installer. If you have installed Dell Display and Peripheral Manager, you do not need to reinstall the software as the affected issue happens only when you first install the software and launch the software from the installer user interface."

https://www.dell.com/support/kbdoc/en-us/000384546/dsa-2025-411

DSA-2025-411: Security Update for Dell Display and Peripheral Manager (Windows) for an Execution with Unnecessary Privileges Vulnerability | Dell US

Dell Display and Peripheral Manager (Windows) remediation is available for an Execution with Unnecessary Privileges vulnerability that could be exploited by malicious users to compromise the affected system.

@kinnison That would be a nice way to escape restricted shells. @liw